Dataset Viewer
Auto-converted to Parquet Duplicate
cve_id
stringclasses
452 values
cve_published
stringclasses
452 values
cve_descriptions
stringclasses
450 values
cve_metrics
dict
cve_references
listlengths
1
64
cve_configurations
listlengths
1
5
cve_primary_cwe
stringclasses
33 values
cve_tags
sequencelengths
1
4
issue_owner_repo
sequencelengths
2
2
issue_body
stringlengths
0
8.04k
issue_title
stringlengths
1
677
issue_comments_url
stringlengths
59
81
issue_comments_count
int64
0
76
issue_created_at
timestamp[ns]
issue_updated_at
stringlengths
20
20
issue_html_url
stringlengths
40
62
issue_github_id
int64
128M
2.89B
issue_number
int64
94
131k
label
bool
2 classes
issue_msg
stringlengths
119
8.18k
issue_msg_n_tokens
int64
119
8.18k
issue_embedding
sequencelengths
3.07k
3.07k
__index_level_0__
int64
4
4.74k
CVE-2023-31609
2023-05-15T15:15:11.673
An issue in the dfe_unit_col_loci component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
{ "cvssMetricV2": null, "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integr...
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch" ], "url": "https://github.com/openlink/virtuoso-opensource/issues/1126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch" ...
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*", "matchCriteriaId": "75FD7F91-D201-4286-8F97-D2D1C7C9D4C3", "versionEndExcluding": null, "versionEndIncluding": null, "vers...
89
[ "Exploit", "Issue Tracking", "Patch" ]
[ "openlink", "virtuoso-opensource" ]
The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR(80), c INTEGER, path VARCHAR(80), id VARCHAR(80), i VARCHAR(80), d VARCHAR(80), e VARCHAR(80), f ...
virtuoso 7.2.9 crashed at dfe_unit_col_loci
https://api.github.com/repos/openlink/virtuoso-opensource/issues/1126/comments
1
2023-04-12T18:58:35
2023-04-17T19:06:54Z
https://github.com/openlink/virtuoso-opensource/issues/1126
1,665,085,302
1,126
true
This is a GitHub Issue repo:virtuoso-opensource owner:openlink Title : virtuoso 7.2.9 crashed at dfe_unit_col_loci Issue date: --- start body --- The PoC is generated by my DBMS fuzzer. ```SQL CREATE TABLE b ( folders VARCHAR(80), folderid VARCHAR(80), parentid VARCHAR(80), rootid VARCHAR...
2,001
[ -0.0009623056976124644, 0.005573991220444441, -0.00876427348703146, -0.003163276007398963, 0.04908569157123566, 0.026400843635201454, -0.006690229754894972, 0.02952631004154682, 0.0016563540557399392, 0.034164100885391235, -0.0074103837832808495, -0.005498375277966261, 0.008490614593029022, ...
684
null
null
null
null
null
null
No_CWE
null
[ "schollz", "croc" ]
Hello. Windows 11 user. I've read the readme but the usage section doesn't help at all. What do I have to do with the croc.exe ? When I run it and paste the 3 lines to edit them in tne prompt it instantly close the window. Also when I open it it already says "enter recieve code" but I want to send a folder to someone. ...
I don't understand how to send a folder
https://api.github.com/repos/schollz/croc/issues/874/comments
2
2025-01-07T20:02:53
2025-01-13T14:40:34Z
https://github.com/schollz/croc/issues/874
2,773,638,219
874
false
This is a GitHub Issue repo:croc owner:schollz Title : I don't understand how to send a folder Issue date: --- start body --- Hello. Windows 11 user. I've read the readme but the usage section doesn't help at all. What do I have to do with the croc.exe ? When I run it and paste the 3 lines to edit them in tne prompt i...
475
[ -0.011878059245646, 0.006608896888792515, -0.017651349306106567, -0.019792161881923676, -0.0073340111412107944, 0.006474233232438564, 0.028148239478468895, 0.058893077075481415, -0.01484757475554943, 0.07066064327955246, -0.014212236739695072, -0.008977603167295456, -0.014571340754628181, ...
4,698
null
null
null
null
null
null
No_CWE
null
[ "cesanta", "mjs" ]
"###### mJS revision\r\n\r\nCommit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830(...TRUNCATED)
SEGV src/mjs_builtin.c:21 in mjs_print
https://api.github.com/repos/cesanta/mjs/issues/225/comments
0
2021-12-31T08:06:38
2021-12-31T08:06:38Z
https://github.com/cesanta/mjs/issues/225
1,091,467,053
225
false
"This is a GitHub Issue\nrepo:mjs\nowner:cesanta\nTitle : SEGV src/mjs_builtin.c:21 in mjs_print\nIs(...TRUNCATED)
1,302
[0.009575335308909416,-0.0010269564809277654,0.001686115050688386,0.014071641489863396,0.03666108846(...TRUNCATED)
3,489
CVE-2024-24267
2024-02-05T18:15:52.427
"gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_fro(...TRUNCATED)
{"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED)
[{"source":"cve@mitre.org","tags":null,"url":"https://github.com/gpac/gpac/commit/d28d9ba45cf4f628a7(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"81F(...TRUNCATED)
401
null
[ "gpac", "gpac" ]
"Memory leak in function [gf_fileio_from_mem](https://github.com/gpac/gpac/blob/941a0891b989f5ad86b7(...TRUNCATED)
Memory leak in function gf_fileio_from_mem
https://api.github.com/repos/gpac/gpac/issues/2571/comments
0
2023-08-29T11:13:38
2023-08-29T13:47:19Z
https://github.com/gpac/gpac/issues/2571
1,871,446,973
2,571
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : Memory leak in function gf_fileio_from_mem\n(...TRUNCATED)
757
[-0.04661935567855835,0.01252696942538023,-0.014278438873589039,-0.03534652292728424,-0.002764150034(...TRUNCATED)
843
CVE-2020-23306
2021-06-10T23:15:07.810
There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0.
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"HIGH","cvssData":{"accessComplexity":"LOW","ac(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Patch","Third Party Advisory"],"url":(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*","matchCr(...TRUNCATED)
787
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
[ "jerryscript-project", "jerryscript" ]
"###### JerryScript revision\r\nbd1c4df\r\n\r\n###### Build platform\r\nUbuntu 16.04.6 LTS (Linux 4.(...TRUNCATED)
stack-overflow in ecma_regexp_match
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3753/comments
6
2020-05-18T05:18:42
2020-05-26T13:29:29Z
https://github.com/jerryscript-project/jerryscript/issues/3753
619,915,696
3,753
true
"This is a GitHub Issue\nrepo:jerryscript\nowner:jerryscript-project\nTitle : stack-overflow in ecma(...TRUNCATED)
2,063
[-0.02298366278409958,0.008875575847923756,-0.002535376464948058,0.00746195437386632,0.0073001966811(...TRUNCATED)
238
CVE-2017-12806
2019-05-09T16:29:00.373
"In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function format8BIM, whi(...TRUNCATED)
{"cvssMetricV2":[{"acInsufInfo":false,"baseSeverity":"MEDIUM","cvssData":{"accessComplexity":"LOW","(...TRUNCATED)
[{"source":"cve@mitre.org","tags":null,"url":"http://lists.opensuse.org/opensuse-security-announce/2(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:imagemagick:imagemagick:7.0.6-6:*:*:*:*:*:*:*","match(...TRUNCATED)
400
[ "Exploit", "Third Party Advisory" ]
[ "ImageMagick", "ImageMagick" ]
"```\r\nroot@ubuntu:/home/hjy/Desktop# convert oom-format8BIM /dev/null\r\n==8638==ERROR: AddressSan(...TRUNCATED)
memory exhaustion in format8BIM
https://api.github.com/repos/ImageMagick/ImageMagick/issues/660/comments
2
2017-08-08T03:28:18
2019-05-10T01:41:26Z
https://github.com/ImageMagick/ImageMagick/issues/660
248,590,588
660
true
"This is a GitHub Issue\nrepo:ImageMagick\nowner:ImageMagick\nTitle : memory exhaustion in format8BI(...TRUNCATED)
5,598
[-0.03249456733465195,0.013010197319090366,0.00020500253594946116,0.0021065110340714455,0.0359034724(...TRUNCATED)
39
null
null
null
null
null
null
No_CWE
null
[ "emqx", "nanomq" ]
"**Describe the bug**\r\n我需要使用MQTTNet客户端发送超大的消息,消息Payload是经(...TRUNCATED)
MQTTNet: client didnt receive 17mb size big msg
https://api.github.com/repos/nanomq/nanomq/issues/1954/comments
1
2024-12-08T03:48:02
2024-12-09T04:34:02Z
https://github.com/nanomq/nanomq/issues/1954
2,724,934,652
1,954
false
"This is a GitHub Issue\nrepo:nanomq\nowner:emqx\nTitle : MQTTNet: client didnt receive 17mb size bi(...TRUNCATED)
3,867
[-0.027407975867390633,0.011029104702174664,-0.0033493528608232737,0.013152149505913258,0.0355016067(...TRUNCATED)
4,313
null
null
null
null
null
null
No_CWE
null
[ "gpac", "gpac" ]
"## Description\r\nThere is a heap-buffer-overflow detected by AddressSanitizer\r\n\r\n## System inf(...TRUNCATED)
There is a heap-buffer-overflow detected by AddressSanitizer
https://api.github.com/repos/gpac/gpac/issues/2065/comments
1
2022-01-26T04:22:40
2022-01-27T10:41:15Z
https://github.com/gpac/gpac/issues/2065
1,114,614,296
2,065
false
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : There is a heap-buffer-overflow detected by (...TRUNCATED)
5,127
[-0.040920455008745193,0.02490301989018917,-0.011947311460971832,0.013211460784077644,0.034899301826(...TRUNCATED)
1,664
null
null
null
null
null
null
No_CWE
null
[ "Piwigo", "Piwigo" ]
The email that is sent is currently in the language of the administrator sending it.
[users] wrong language when generating password email
https://api.github.com/repos/Piwigo/Piwigo/issues/2287/comments
0
2024-12-04T13:13:30
2024-12-04T14:08:08Z
https://github.com/Piwigo/Piwigo/issues/2287
2,717,703,452
2,287
false
"This is a GitHub Issue\nrepo:Piwigo\nowner:Piwigo\nTitle : [users] wrong language when generating p(...TRUNCATED)
245
[-0.017018616199493408,0.014563876204192638,-0.00430265162140131,0.0026141609996557236,0.02921003289(...TRUNCATED)
3,790
CVE-2023-37766
2023-07-11T23:15:09.210
"GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a segmentation violation in the gf(...TRUNCATED)
{"cvssMetricV2":null,"cvssMetricV30":null,"cvssMetricV31":[{"cvssData":{"attackComplexity":"LOW","at(...TRUNCATED)
[{"source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"],"url":"https://github.com/gpac/gpac/(...TRUNCATED)
[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:gpac:gpac:2.3-dev-rev381-g817a848f6-master:*:*:*:*:*:(...TRUNCATED)
787
[ "Exploit", "Vendor Advisory" ]
[ "gpac", "gpac" ]
"Hello,I use the fuzzer(AFL) to fuzz binary gpac and got some crashes.\r\nThe following is the detai(...TRUNCATED)
SEGV on unknown address 0x000000000038
https://api.github.com/repos/gpac/gpac/issues/2516/comments
0
2023-07-04T13:14:59
2023-07-04T15:06:27Z
https://github.com/gpac/gpac/issues/2516
1,787,914,764
2,516
true
"This is a GitHub Issue\nrepo:gpac\nowner:gpac\nTitle : SEGV on unknown address 0x000000000038\nIssu(...TRUNCATED)
2,576
[-0.02695433981716633,0.014355783350765705,-0.00030584351043216884,0.009909234009683132,0.0181070808(...TRUNCATED)
758
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
2